Cybersecurity Competency Integration in Maritime Curricula: Preparing Future Seafarers for Digital Ship Operations and Cyber-Physical Systems Management
DOI:
https://doi.org/10.55123/ijisit.v2i2.50Keywords:
Cybersecurity Competency, Maritime Curricula, Digital Ship Operations, Incident Response, STIP JakartaAbstract
The increasing digitalization of shipboard operations through integrated navigation systems, automated engine control, satellite communications, and Internet of Things sensor networks creates critical cybersecurity vulnerabilities that contemporary maritime officers must understand and mitigate, yet cybersecurity training remains largely absent from traditional maritime education curricula designed for pre-digital shipping eras. This study investigates cybersecurity competency integration at STIP Jakarta through curriculum gap analysis, pilot cybersecurity module implementation, and multi-stakeholder assessment of training needs and priorities. Findings reveal that 87 percent of graduating maritime officers lack basic cyber threat awareness, 94 percent report no cybersecurity training during maritime education, and maritime industry employers identify cyber risk management as the second-most critical competency gap among new hires after only practical shipboard experience. Pilot cybersecurity modules addressing threat recognition, password security, phishing awareness, and incident response procedures improve cyber literacy by 67 to 74 percent and generate high student demand for expanded coverage. The study proposes a Cybersecurity Curriculum Integration Framework for maritime education addressing both technical cyber risk management and operational security culture development.
Downloads
References
[1] P. H. Meland, K. Bernsmed, and E. Wille, "Cybersecurity in the maritime sector: A systematic literature review," WMU Journal of Maritime Affairs, vol. 20, no. 3, pp. 345–368, 2021.
[2] B. Svilicic, D. Brčić, S. Žuškin, and D. Kalebić, "Raising awareness on cyber security of ECDIS," TransNav: International Journal on Marine Navigation and Safety of Sea Transportation, vol. 13, no. 1, pp. 231–236, 2019.
[3] K. D. Jones, K. Tam, and M. Papadaki, "Threats and impacts in maritime cyber security," Engineering & Technology Reference, pp. 1–13, 2016.
[4] G. Kavallieratos, S. Katsikas, and V. Gkioulos, "Cyber-attacks against the autonomous ship," in Computer Security, Cham: Springer, 2018, pp. 20–36.
[5] J. P. Farwell and R. Rohozinski, "Stuxnet and the future of cyber war," Survival, vol. 53, no. 1, pp. 23–40, 2011.
[6] C. Roth, "Navigation warfare and resilience: Getting serious about GPS disruption," Center for International Maritime Security, 2019.
[7] A. Androjna, S. Brcko, T. Pavic, and H. Greidanus, "Assessing cyber challenges of maritime navigation," Journal of Marine Science and Engineering, vol. 8, no. 10, p. 776, 2020.
[8] R. Lark, G. Kavallieratos, S. Katsikas, and V. Gkioulos, "Cyber risk management for autonomous passenger ships," Ocean Engineering, vol. 266, p. 113067, 2022.
[9] K. Tam and K. Jones, "MaCRA: A model-based framework for maritime cyber-risk assessment," WMU Journal of Maritime Affairs, vol. 18, no. 1, pp. 129–163, 2019.
[10] G. C. Kessler, "Cybersecurity in the maritime domain," in Proc. 13th Int. Conf. Cyber Warfare and Security, 2020, pp. 279–286.
[11] M. Baldauf, K. Benedict, S. Fischer, F. Gluch, M. Kirchhoff, S. Klaes, U. Schröder-Hinrichs, S. Meussling, and S. Fielitz, "e-Navigation and situation-dependent manoeuvring assistance to enhance maritime emergency response," WMU Journal of Maritime Affairs, vol. 10, no. 2, pp. 209–226, 2011.
[12] European Union Agency for Cybersecurity, Port Cybersecurity: Good Practices for Cybersecurity in the Maritime Sector. Heraklion, Greece: ENISA Publishing, 2019.
[13] S. Wendzel, J. Keller, and C. Jörg, "On maritime cyber security: Recommendations for the implementation of maritime cyber security management," in Proc. SECURWARE 2019, 2019, pp. 1–6.
[14] BIMCO, The Guidelines on Cyber Security Onboard Ships, Version 4. London, UK: Baltic and International Maritime Council, 2020.
[15] D. Hopcraft and K. Tam, "Strategic approaches to improving maritime cyber security," Journal of Cybersecurity, vol. 5, no. 1, 2019.
[16] International Maritime Organization, Guidelines on Maritime Cyber Risk Management, MSC-FAL.1/Circ.3/Rev.1, 2021.
[17] M. Manuel, "Managing training in the maritime industry: A learning organization perspective," WMU Journal of Maritime Affairs, vol. 10, no. 1, pp. 77–94, 2011.
[18] J. W. Creswell and V. L. Plano Clark, Designing and Conducting Mixed Methods Research, 3rd ed. Thousand Oaks, CA: SAGE Publications, 2018.
[19] V. Braun and V. Clarke, "Using thematic analysis in psychology," Qualitative Research in Psychology, vol. 3, no. 2, pp. 77–101, 2006.
[20] M. Q. Patton, Qualitative Research and Evaluation Methods, 4th ed. Thousand Oaks, CA: SAGE Publications, 2015.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Renta Novaliana Siahaan, Eriza I. Ulmi, Fitri Mulyana

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish their manuscripts in the International Journal of Computer Science and Information Technology agree to the following terms:
Copyright: Copyright on any article in the International Journal of Computer Science and Information Technology is fully retained by its authors under the Creative Commons Attribution-ShareAlike 4.0 International License / CC BY SA 4.0, with the following provisions:
- First Publication Right: Authors acknowledge that the International Journal of Computer Science and Information Technology has the right of first publication under the CC BY-SA 4.0 license.
- Non-Exclusive Distribution: Authors may enter the writing separately, arrange non-exclusive distribution of the published manuscript in this journal into other versions (e.g., submit to the author's institutional repository, publish in a book, etc.), acknowledging that the manuscript was first published in the International Journal of Computer Science and Information Technology.
- Reader's Rights: Readers are allowed to download, use, and adopt the contents of the article as long as they cite the article by mentioning the title, author, and the name of this journal. Such citations are made for the advancement of science and humanity and must not violate applicable laws.










